proxy token translation service internals
play

Proxy Token Translation Service - internals Mischa Sall e - PowerPoint PPT Presentation

Proxy Token Translation Service - internals Mischa Sall e msalle@nikhef.nl EGI Community Forum, Bari 12 November 2015 Mischa Sall e (Nikhef) 1 / 13 Token Translation Service Focus on interaction VO-portal Master-portal (TTS) A


  1. Proxy Token Translation Service - internals Mischa Sall´ e msalle@nikhef.nl EGI Community Forum, Bari 12 November 2015 Mischa Sall´ e (Nikhef) 1 / 13

  2. Token Translation Service Focus on interaction VO-portal ↔ Master-portal (TTS) A Proxy Token Translation Service Mischa Sall´ e (Nikhef) 2 / 13

  3. Token Translation Service Our token: short-lived RFC3820 (VOMS) proxy certificate Translation from SAML identity to proxy certificate Access to TTS must be restricted to certain services: → delegation scenario : use OpenID Connect TTS acts as OIDC server (Authorization Server and protected Resource) VO Portal acts as OIDC client Use OIDC access token to obtain proxy certificate A Proxy Token Translation Service Mischa Sall´ e (Nikhef) 3 / 13

  4. End Entity Certificate Also need End-Entity Certificate (EEC) Cache EEC in MyProxy credential store behind TTS CILogon portal-delegation scenario ( http://goo.gl/VnMKXS ) Uses OpenID Connect for MyProxy protocol OIDC server in front of a MyProxy Online CA TTS acts as OIDC client Uses OIDC access token to obtain End-Entity Certificate → Use protocol and OpenID Connect server twice! A Proxy Token Translation Service Mischa Sall´ e (Nikhef) 4 / 13

  5. Building blocks End Entity Certificate : produced using MyProxy online CA OIDC4MP DS is OIDC server TTS/Master Portal is OIDC client EEC cached in MyProxy credential store Proxy Certificate (our token) : produced using EEC in MyProxy credential store TTS/Master Portal is OIDC server VO Portal is OIDC client proxy is retrieved and used by VO portal Building Blocks Mischa Sall´ e (Nikhef) 5 / 13

  6. TTS Overview: getting a certificate Architecture Mischa Sall´ e (Nikhef) 6 / 13

  7. TTS Overview: cmdline via ssh backdoor Architecture Mischa Sall´ e (Nikhef) 7 / 13

  8. TTS Overview: using OIDC only Architecture Mischa Sall´ e (Nikhef) 8 / 13

  9. TTS Overview: complete picture Architecture Mischa Sall´ e (Nikhef) 9 / 13

  10. Bonus features OpenID Connect server: Reuse OIDC4MP server for pure OpenID Connect SAML-to-OIDC token translation service (not difficult in itself) Broader use for Master Portal SSH backdoor for commandline access: VO portal: SSH pubkey upload (similar to GitHub, CERN) Master Portal (TTS): store in LDAP cron-job: authorized keys with fixed command ( myproxy-logon wrapper) user obtains proxy using SSH-Agent → No need for ECP, Moonshot, custom passwords etc. Discussion Mischa Sall´ e (Nikhef) 10 / 13

  11. More Bonus features Smooth transition from PUSP: MyProxy CA not much different from MyProxy credential store Can use robot cert+key instead of CA cert+key Few simple changes in config of MyProxy CA → produce PUSP instead of EEC Based on well-maintained and proven software: Production software, widely used in US Actively developed Maintainers are part of AARC Easy to replace components (modular setup) Discussion Mischa Sall´ e (Nikhef) 11 / 13

  12. Next steps Implementation Master Portal: minor adaptations to profile (already agreed upon): /getproxy endpoint extra OIDC server servlet inside Master portal /getproxy endpoint behind /authorize endpoint /authorize endpoint first server servlet then client servlet flow for pure OIDC, probably using different scope implement SSH key upload: /putkey endpoint? Next steps and conclusions Mischa Sall´ e (Nikhef) 12 / 13

  13. Final remarks Work in progress but looking good! Based on AARC-SA1 pre-pilot work Combining existing blocks, minimal glue Many thanks to Tamas Balogh (doing a lot of the hard work) Next steps and conclusions Mischa Sall´ e (Nikhef) 13 / 13

  14. Some References Our setup: https://wiki.nikhef.nl/grid/CILogon_Pre-Pilot_Work OpenID Connect for MyProxy: http://goo.gl/VnMKXS CILogon docs: http://www.cilogon.org/portal-delegation MyProxy: http://grid.ncsa.illinois.edu/myproxy/ OA4MP: http://grid.ncsa.illinois.edu/myproxy/oauth/ protocol: http://grid.ncsa.illinois.edu/myproxy/protocol/ VOMS: e.g. http://italiangrid.github.io/voms/ ssh authorized keys : man sshd Mischa Sall´ e (Nikhef) 14 / 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend